1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
2 years ago
8

The _________ shortcut keys underline words, and not spaces

Computers and Technology
1 answer:
fenix001 [56]2 years ago
8 0

CTRL+SHIFT+W

Have a nice day :}

You might be interested in
After the following code is executed what will be displayed on the screen? bool correntEmployee = true; double empSalary = 45000
AlexFokin [52]

Answer:

"The employee pay rate is normal" is the correct answer for the above question.

Explanation:

  • The above question code is written in the c++ language, in which there is one variable of bool type whose value is true.
  • And this variable is also tested in the if-condition which gives the true and the if-body will be executed.
  • Then the internal if-condition will give the false result because the value of the empsalary is not less than 45000. It is because the above statement "empsalary=45000" will assign the value 45000 on the empsalary variable.
  • Then the else block will be executed which prints "the employee pay rate is normal".

7 0
3 years ago
Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?
laila [671]

Answer:

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

Explanation:

Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?

a. Test Sandbox

c. Test Sandbox

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

From the question, we are informed that Universal Containers wants to use a sandbox with real data in it. In this case I will recommend Full Sandbox, Partial Sandbox and Developer Pro.

Sandboxes. In cybersecurity sandbox can be explained as security mechanism that is utilized to separate running programs, and this is an effort utilized to curb system failure as well as software vulnerabilities to disperse.

Sandboxes are crucial when executing suspicious code, it helps to do this so that the host device is is not put to risk of harm. Since, Containers wants to use a sandbox with real data in it then the three types of sandboxes can be use.

✓Full sandboxes allows performance testing as well as staging it can be regarded as copy of production org, and these can be objects attachment and others

✓Partial Copy Sandbox can be allows copying of configuration and part of one's data, in order to allow new configuration testing with one's real data.

5 0
2 years ago
Jana works in a call center helping people who are having trouble setting up their
olchik [2.2K]

Answer:

Information Support and Services

Explanation:

She works helping people setting up their accounts so she supports with information from her services

4 0
2 years ago
Read 2 more answers
What is the quickest option for adding internet images to a power point presentation
Alex777 [14]

Answer:copy and paste

Explanation:

5 0
3 years ago
What's is flow chart?
TEA [102]

Answer: A flowchart is a graphical representation of decisions and their results mapped out in individual shapes.

Explanation:

These shapes were first developed by Herman Goldstine and John von Neumann in the 1940s.

Flowcharts can provide a step-by-step diagram for mapping out complex situations, such as programming code or troubleshooting problems with a computer.

4 0
3 years ago
Other questions:
  • You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the
    6·1 answer
  • Martha wants to invite her coworkers to her birthday party. She uses the mail merge feature to compose and send the invitations.
    6·1 answer
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    14·1 answer
  • Add a new row to a table by clicking in the
    10·1 answer
  • Describe five examples of civil engineering projects.
    6·1 answer
  • Http://www.alegrium.com/sgi/2/eibder
    5·1 answer
  • Hi um... i just wanna say hi :P
    6·2 answers
  • Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology
    5·1 answer
  • (40 PTS) Be specific
    12·1 answer
  • Which of the following is NOT a best practice to protect data on your mobile computing device?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!